Social and Community Intelligence
Bin Guo, Institut TELECOM SudParis, EvryZhiwen Yu, Northwestern Polytechnical University, Xi'an

This paper introduces an emerging research area – Social and Community Intelligence (SCI). It aims at revealing the individual/group/social behaviors, relationships as well as community dynamics by mining the digital traces left by people while interacting with cyber-physical spaces. The digital traces are generated mainly from three information sources: Internet and Web applications, static infrastructure, mobile devices and wearable sensors. The paper discusses the evolution, general framework, major applications, and research issues of Social and Community Intelligence.

Index Terms: C.3.h Ubiquitous computing, C.5.7 Wearable Computers, D.2.14 Human Factors in Software Design, I.2 Artificial Intelligence, E Data, C.2 Communication/Networking and Information Technology, Multimedia Information Systems, H.3.5 Online Information Services, web programming, web applications, Pervasive computing, mobile applications, Internet applications, database technology, Computer-supported cooperative work, C.2 Communication/Networking and Information Technology, Multimedia Information Systems, H.3.5 Online Information Services, web programming, web applications, Pervasive computing, mobile applications, Internet applications, database technology, Computer-supported cooperative work, C.3.h Ubiquitous computing, J.9.d Pervasive computing, J.4 Social and Behavioral Sciences, I.2.1 Applications and Expert Knowledge-Intensive Systems, J.8 Internet Applications, C.2.0.c Emerging technologies,Citation: Daqing Zhang, Bin Guo, Zhiwen Yu, "Social and Community Intelligence," Computer, 17 Feb. 2011. IEEE computer Society Digital Library. IEEE Computer Society, Usage of this product signifies your acceptance of the Terms of Use.


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.
»»  READMORE...

Roadmap for Trusted Hardware – Part II: Trojan Detection Solutions and Design-for-Trust Challenges

Globalization of the semiconductor industry and horizontal design and fabrication processes have made integrated circuits (ICs) increasingly vulnerable to malicious activities and alterations. The vulnerabilities have raised serious concerns regarding possible threats to military systems, financial infrastructures, and transportation security systems. An adversary can introduce a Trojan to disable and/or destroy a system at some specific future time. Alternatively, the attacker can design a failure mode such as wire failure, which survives the testing phase and fails before the expected lifetime. A Trojan can also be designed to leak confidential information and secret keys covertly. Detection of such Trojans is extremely difficult. This article discusses various detection techniques and presents the challenges that must be addressed.

Index Terms: B.4.5 Reliability, Testing, and Fault-Tolerance, B.7.3 Reliability and Testing, B.9 Power Management, B.2.3 Reliability, Testing, and Fault-Tolerance, B.7.3 Reliability and Testing, C.2 Communication/Networking and Information Technology, H.3.5 Online Information Services, A General Literature, software architecture, services computing, requirements engineering, project management, Software Engineering, A.0 General, B.7 Integrated Circuits, B.1.m.a Emerging technologies,Citation: Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang, Michel Wang, Ramesh Karri, Jeyavijayan Rajendran, Kurt Rosenfeld, "Roadmap for Trusted Hardware – Part II: Trojan Detection Solutions and Design-for-Trust Challenges," Computer, 22 Dec. 2010. IEEE computer Society Digital Library. IEEE Computer Society, Usage of this product signifies your acceptance of the Terms of Use.


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.
»»  READMORE...

Engineering Heterogeneous Robotics Systems: A Software Architecture-Based Approach
Ivo Krka, University of Southern California, Los Angeles

This paper describes an approach to engineering distributed, adaptive, software-intensive systems deployed on mobile robots accompanied with sensor-based, handheld, and desktop platforms. The foundation of this approach is software architecture—a set of principal design decisions about a software-intensive system—that enables (1) guided exploration of design alternatives, (2) rigorous system modeling and analysis, (3) implementation and deployment in heterogeneous settings, and (4) powerful new system behaviors— dynamic and autonomous adaptation. Our experience in the context of two different scenarios indicates that this work can help to make the development of robotic systems more accessible to non-experts, improve the exchange of design solutions among robotics engineers, deal effectively with heterogeneity inherent in mobile robotics systems, and develop adaptive systems that can be deployed into complex and changing environments.

Index Terms: D Software/Software Engineering, D.2 Software Engineering, D.2.11 Software Architectures, D.2.11.b Domain-specific architectures, D.2.11.d Languages, D.2.17 Software Construction, A.0.b Conference Proceedings, B.8 Performance and Reliability, D.2.0 General, D.2.10 Design, D.2.1 Requirements/Specifications, D.2.11 Software Architectures, A General Literature, software architecture, services computing, requirements engineering, project management, Software Engineering, A.0 General, D.2 Software Engineering, D.2.4 Software/Program Verification, D Software/Software Engineering, I.2.9 Robotics, D.2.11 Software Architectures, D.2.11.b Domain-specific architectures, D.2.11.e Patterns, D.2.13.b Reusable libraries, D.2.17 Software Construction,Citation: Nenad Medvidovic, Hossein Tajalli, Joshua Garcia, Yuriy Brun, Ivo Krka, George Edwards, "Engineering Heterogeneous Robotics Systems: A Software Architecture-Based Approach," Computer, 22 Dec. 2010. IEEE computer Society Digital Library. IEEE Computer Society, Usage of this product signifies your acceptance of the Terms of Use.


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.
»»  READMORE...

Three R's of Cyber-Physical Spaces

Recognition, reasoning and retrieval are three fundamental operations in a cyber-physical space that is capable of identifying and tracking the movements of people and answering questions about their whereabouts. We show that a state transition system effectively abstracts the three R's: events abstract recognition, transition function abstracts the reasoning, and states abstract the information necessary for performing retrieval. We provide quantitative metrics for the performance of a cyber-physical space by refining the standard information-theoretic measures of precision and recall. This article also presents performance improvements from integrating spatio-temporal reasoning with biometric-based recognition.

Index Terms: C.3.h Ubiquitous computing, J.9.a Location-dependent and sensitive, O.8.12 Surveillance systems, C.2 Communication/Networking and Information Technology, Multimedia Information Systems, H.3.5 Online Information Services, web programming, web applications, Pervasive computing, mobile applications, Internet applications, database technology, Computer-supported cooperative work, H.2.8 Database Applications, H.2.8.d Data mining, O.1.4 Multi-modal recognition, O.8 Affective computing applications, J.9.d Pervasive computing, H.3.3 Information Search and Retrieval,Citation: Vivek Menon, Bharat Jayaraman, Venu Govindaraju, "Three R's of Cyber-Physical Spaces," Computer, 16 Feb. 2011. IEEE computer Society Digital Library. IEEE Computer Society, Usage of this product signifies your acceptance of the Terms of Use.


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.
»»  READMORE...

The use of computation in the decoding of the first known computer

The Antikythera Mechanism is an extraordinary multi-geared mechanical calculator from ancient Greece. We describe our use of computational methods and software in experimental and theoretical investigations of its astronomical functions and displays.

Index Terms: A General Literature, A.m Miscellaneous, C.2 Communication/Networking and Information Technology, Multimedia Information Systems, H.3.5 Online Information Services, web programming, web applications, Pervasive computing, mobile applications, Internet applications, database technology, Computer-supported cooperative work, A General Literature, B Hardware, A.0 General, J.2.b Archaeology, J.2.c Astronomy, J.2.g Engineering, K.2 History of Computing,Citation: Michael Edmunds, Tony Freeth, "The use of computation in the decoding of the first known computer," Computer, 28 Apr. 2011. IEEE computer Society Digital Library. IEEE Computer Society, Usage of this product signifies your acceptance of the Terms of Use.


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.
»»  READMORE...

Remote display solutions for mobile cloud computing

Although they suffer from intrinsic resource limitations, mobile devices have become very popular. Mobile cloud computing provides a solution to meet the increasing functionality demands of end-users, as all application logic is executed on distant servers and only user interface functionalities reside on the mobile device. The mobile device acts as a remote display, capturing user input and rendering the display updates received from the distant server. Varying wireless channel conditions, short battery lifetime and interaction latency introduce major challenges for the remote display of cloud applications on mobile devices. In this paper, we discuss a number of adequate solutions that have recently been proposed to tackle the main issues associated with the remote display of cloud services on mobile devices.

Index Terms: H.4.3 Communications Applications, J.9 Mobile Applications, C.2 Communication/Networking and Information Technology, Multimedia Information Systems, H.3.5 Online Information Services, web programming, web applications, Pervasive computing, mobile applications, Internet applications, database technology, Computer-supported cooperative work, B.3.4.d Test generation, B.3.4.a Diagnostics, J.8 Internet Applications, J.9 Mobile Applications, C.2.4.a Client/server, C.3.h Ubiquitous computing,Citation: Pieter Simoens, Filip De Turck, Bart Dhoedt, Piet Demeester, "Remote display solutions for mobile cloud computing," Computer, 23 Feb. 2011. IEEE computer Society Digital Library. IEEE Computer Society, Usage of this product signifies your acceptance of the Terms of Use.


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.
»»  READMORE...

Reports of the Death of the Web are Greatly Exaggerated: Towards Real Web Applications for Mobile Devices

The software industry is currently experiencing two parallel paradigm shifts – one towards web-based software and another towards web-enabled mobile devices. The resulting convergence of desktop, mobile and web application development has already unleashed the development of entirely new types of web-based software systems. These new systems, built to leverage the vast capabilities of the World Wide Web, allow the use of dynamically downloaded applications and services from any type of terminal, including both desktop computers and mobile devices. Furthermore, the applications use the available resources in unforeseen ways, and imply radical changes to the ways people develop, deploy and use software. In this paper, we summarize our experiences in developing such applications with a family of purely web-based software systems. We also briefly review some recent technologies and trends that are making the Web a better place for real applications, not just for documents.

Index Terms: D Software/Software Engineering, D.1 Programming Techniques, D.1.8 Distributed programming, D.2 Software Engineering, D.2.0.c Software engineering for Internet projects, D.2.1 Requirements/Specifications, D.2.10 Design, D.2.11 Software Architectures, D.2.17 Software Construction, D.2.2 Design Tools and Techniques, C.2 Communication/Networking and Information Technology, Multimedia Information Systems, H.3.5 Online Information Services, web programming, web applications, Pervasive computing, mobile applications, Internet applications, database technology, Computer-supported cooperative work, H.5.4 Hypertext/Hypermedia, D Software/Software Engineering, C.2.8 Mobile Computing, D.2.7.e Evolving Internet applications, D.3.2.r Scripting languages,Citation: Tommi Mikkonen, Antero Taivalsaari, "Reports of the Death of the Web are Greatly Exaggerated: Towards Real Web Applications for Mobile Devices," Computer, 31 Mar. 2011. IEEE computer Society Digital Library. IEEE Computer Society, Usage of this product signifies your acceptance of the Terms of Use.


View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.
»»  READMORE...